Results 31 to 40 of about 1,071 (86)

End-to-End Simulation of 5G mmWave Networks [PDF]

open access: yes, 2018
Due to its potential for multi-gigabit and low latency wireless links, millimeter wave (mmWave) technology is expected to play a central role in 5th generation cellular systems.
Dutta, Sourjya   +6 more
core   +2 more sources

Charting the Algorithmic Complexity of Waypoint Routing [PDF]

open access: yes, 2018
Modern computer networks support interesting new routing models in which traffic flows from a source sto a destination t can be flexibly steered through a sequence of waypoints, such as (hardware) middleboxes or (virtualized) network functions (VNFs), to
Akhoondian Amiri, Saeed   +3 more
core   +1 more source

Allocation of Heterogeneous Resources of an IoT Device to Flexible Services

open access: yes, 2016
Internet of Things (IoT) devices can be equipped with multiple heterogeneous network interfaces. An overwhelmingly large amount of services may demand some or all of these interfaces' available resources.
Angelakis, Vangelis   +4 more
core   +1 more source

Scalability analysis of large-scale LoRaWAN networks in ns-3

open access: yes, 2017
As LoRaWAN networks are actively being deployed in the field, it is important to comprehend the limitations of this Low Power Wide Area Network technology. Previous work has raised questions in terms of the scalability and capacity of LoRaWAN networks as
Abeele, Floris Van den   +3 more
core   +1 more source

User sentiment detection: a YouTube use case [PDF]

open access: yes, 2010
In this paper we propose an unsupervised lexicon-based approach to detect the sentiment polarity of user comments in YouTube. Polarity detection in social media content is challenging not only because of the existing limitations in current sentiment ...
Breslin, John G., Choudhury, Smitashree
core  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Issues of WLAN [PDF]

open access: yes, 2020
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or ...
khurrum, abbas
core   +2 more sources

Spectrum Allocation in Two-Tier Networks

open access: yes, 2008
Two-tier networks, comprising a conventional cellular network overlaid with shorter range hotspots (e.g. femtocells, distributed antennas, or wired relays), offer an economically viable way to improve cellular system capacity.
Andrews, Jeffrey G.   +1 more
core   +1 more source

Segmenting Scientific Abstracts into Discourse Categories: A Deep Learning-Based Approach for Sparse Labeled Data

open access: yes, 2020
The abstract of a scientific paper distills the contents of the paper into a short paragraph. In the biomedical literature, it is customary to structure an abstract into discourse categories like BACKGROUND, OBJECTIVE, METHOD, RESULT, and CONCLUSION, but
Banerjee, Soumya   +4 more
core   +1 more source

Beyond Node Degree: Evaluating AS Topology Models [PDF]

open access: yes, 2012
This is the accepted version of 'Beyond Node Degree: Evaluating AS Topology Models', archived originally at arXiv:0807.2023v1 [cs.NI] 13 July 2008.Many models have been proposed to generate Internet Autonomous System (AS) topologies, most of which make ...
Fay, D   +7 more
core  

Home - About - Disclaimer - Privacy